Herd behavior in information security decision-making

被引:24
|
作者
Vedadi, Ali [1 ]
Warkentin, Merrill [2 ]
Dennis, Alan [3 ]
机构
[1] Middle Tennessee State Univ, Informat Syst & Analyt, Murphreesboro, TN 37132 USA
[2] Mississippi State Univ, Coll Business, Dept Management & Informat Syst, Mississippi State, MS 39762 USA
[3] Indiana Univ, Kelley Sch Business, Bloomington, IN 47405 USA
关键词
Popularity information; Imitation; Herd behavior; Information security; Coping appraisal; Bounded rationality; SOCIAL-INFLUENCE; FEAR APPEALS; PROTECTION MOTIVATION; EMPIRICAL-EXAMINATION; POLICY COMPLIANCE; ADOPTION; POPULARITY; THREATS; METAANALYSIS; ANTECEDENTS;
D O I
10.1016/j.im.2021.103526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current information security behavior research assumes that lone individuals make a rational, informed decision about security technologies based on careful consideration of personally available information. We challenge this assumption by examining how the herd behavior influences users' security decisions when coping with security threats. The results show that uncertainty about a security technology leads users to discount their own information and imitate others. We found that imitation tendency has a more substantial effect on security decisions than the personal perceived efficacy of the security technology. It is essential for researchers and managers to consider how the herd behavior effect influences users' security decisions.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Three categories of decision-making and information security
    Abo Akademi Univ, Abo, Finland
    Comput Secur, 5 (397-405):
  • [2] Decision-Making by Effective Information Security Managers
    Pettigrew, James
    Ryan, Julie
    Salous, Kyle
    Mazzuchi, Thomas
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 465 - 472
  • [3] The three categories of decision-making and information security
    Finne, T
    COMPUTERS & SECURITY, 1998, 17 (05) : 397 - 405
  • [4] A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING
    Stepanova, Daria
    Parkin, Simon E.
    van Moorsel, Aad
    ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 2009, : 326 - 331
  • [5] A model of the information security investment decision-making process
    Dor, Daniel
    Elovici, Yuual
    COMPUTERS & SECURITY, 2016, 63 : 1 - 13
  • [6] Research on Information Security Scheme Decision-making of Internet Banking
    Wu Pufeng
    Liu Qi
    Wu PuSheng
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 2133 - +
  • [7] INFORMATION AND DECISION-MAKING
    LAUER, H
    BETRIEBSWIRT, 1977, 18 (03): : 65 - 69
  • [8] INFORMATION FOR DECISION-MAKING
    MORRIS, A
    ASLIB PROCEEDINGS, 1984, 36 (11-1): : 411 - 414
  • [9] Modeling and simulation of stranded passengers' transferring decision-making on the basis of herd behavior
    Shen, Yang
    Liu, Si-Feng
    Fang, Zhi-Geng
    Hu, Ming-Li
    Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services, GSIS'11 - Joint with the 15th WOSC International Congress on Cybernetics and Systems, 2011, : 795 - 802
  • [10] Herd and network effects in migration decision-making
    Epstein, Gil S.
    JOURNAL OF ETHNIC AND MIGRATION STUDIES, 2008, 34 (04) : 567 - 583